General

  • Target

    JaffaCakes118_a48408d1fbdd252e024d2ea2c0d8dc9939981207bc0e1d39bda52a29b967c22d

  • Size

    184KB

  • Sample

    241230-yan1faxqdv

  • MD5

    89405228878366f869e0983b272974f9

  • SHA1

    829d7c31f37ec792fb94d288e66ccd6331dfdd71

  • SHA256

    a48408d1fbdd252e024d2ea2c0d8dc9939981207bc0e1d39bda52a29b967c22d

  • SHA512

    37d67307dad9ffeb186c14ebe99da040f71b143a84f3567132f4c31716a17be1a47ce577bb36760f29d16d9268f31f1df63e2eb11ae21058d74100f1545d4f48

  • SSDEEP

    3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoqlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaogoC

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

80.241.218.90:443

103.161.172.109:13786

87.98.128.76:5723

rc4.plain
rc4.plain

Targets

    • Target

      JaffaCakes118_a48408d1fbdd252e024d2ea2c0d8dc9939981207bc0e1d39bda52a29b967c22d

    • Size

      184KB

    • MD5

      89405228878366f869e0983b272974f9

    • SHA1

      829d7c31f37ec792fb94d288e66ccd6331dfdd71

    • SHA256

      a48408d1fbdd252e024d2ea2c0d8dc9939981207bc0e1d39bda52a29b967c22d

    • SHA512

      37d67307dad9ffeb186c14ebe99da040f71b143a84f3567132f4c31716a17be1a47ce577bb36760f29d16d9268f31f1df63e2eb11ae21058d74100f1545d4f48

    • SSDEEP

      3072:liLVj+luuUXoPOK2z1WPRgg5YbW+d0Ojk1bSA5q/eaoqlzoxss7:liLVCIT4WK2z1W+CUHZj4Skq/eaogoC

    • Dridex

      Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

    • Dridex family

    • Dridex Loader

      Detects Dridex both x86 and x64 loader in memory.

MITRE ATT&CK Enterprise v15

Tasks